Six Steps to Protect Customer Data

The Facebook - Cambridge Analytica scandal is simply the natural outcome of today's data-driven economy that puts businesses and others first, not users. Mark Zuckerberg's apology is a first step, but it's not enough. 

The seriousness of the revelations calls for more than mere apologies.

Change is Needed

Society needs higher standards for transparency and ethics when it comes to the handling of our information. Anyone who collects data must be accountable to their users and to society.

As we have seen recently, data abuse and mishandling can have grave consequences for both individuals and society.

The Internet Society is deeply committed to an Internet that is trusted by its users. In a connected world, everyone is affected by everybody else's actions. Incidents like this contribute to an overall climate of declining trust in the Internet and threaten its economic value.

We recommend that those who collect, use or share our data:

  1. Make sure policies about data handling reflect our interests first. As their users, we should be their first priority
  2. They must restrict and monitor any access or use of our personal data. Don't collect our data if you can't manage it.
  3. Be transparent about how they share our personal data, with whom and why.
  4. Set clear rules for handling and sharing our personal data and show us how those rules are being enforced.
  5. If our data is going to be collected, make it easy for us to control what will be collected, how it will be used, and who it will be shared with.
  6. Ask us to opt-in. Don't require us to opt-out.

If we are to continue to benefit from the value the Internet can bring, we must trust our services and platforms. Businesses must do better.

Information- Management

You Might Also Read: 

Is Your Data Being Sold On The Dark Web?:

Data Protection Officer's Guide To The GDPR Galaxy:

 

« GDPR Countdown
Fixing Hacks Has A Deadly Impact On Hospitals »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Security Stronghold

Security Stronghold

Security Stronghold is focused on protecting computers from malicious programs like viruses, Trojans, spyware, adware, trackware, keyloggers and other kinds of online threats.

Device Authority

Device Authority

Device Authority specialises in security automation for the Internet of Things (IoT).

Tiro Security

Tiro Security

Tiro Security is a boutique company specializing in information security and IT audit recruitment and solutions.

idappcom

idappcom

idappcom provides unique industry approved software solutions for auditing and enhancing the threat recognition and response capabilities of your corporate security defences.

Arsenal Recon

Arsenal Recon

Arsenal Recon are digital forensics experts, providing consultancy services and powerful software tools to improve the analysis of electronic evidence.

McIntyre Associates

McIntyre Associates

McIntyre Associates is an Executive Search boutique specialized in recruiting for the Cybersecurity industry. Our clients range from Venture Capital backed startups to Fortune 100 companies.

Venkon

Venkon

Venkon provides effective and unique solutions to cyber-security threats and IT compliance requirements of your organization.

Riskaware

Riskaware

CyberAware, by Riskaware, provides business-critical cyber attack analysis and impact assessments using NIST standards aligned with NCSC guidance.

Hybrid Identity Protection Conference (HIP)

Hybrid Identity Protection Conference (HIP)

Hybrid Identity Protection (HIP) is the premier educational forum for identity-centric cybersecurity practitioners charged with defending hybrid cloud environments.

Atomic Data

Atomic Data

Atomic Data is an on-demand, always-on, pay-as-you-go expert extension of your enterprise IT team and infrastructure.

PagerDuty

PagerDuty

PagerDuty is the central nervous system for a company’s digital operations. We identify issues in real-time and bring together the right people to respond to problems faster.

Prophaze Technologies

Prophaze Technologies

Prophaze enable organizations and SaaS providers to improve their web application cybersecurity and reduce costs through AI automation.

Indevtech

Indevtech

Indevtech has been serving Hawaii since 2001, providing end-to-end managed IT services to small- and medium-businesses.

SecureDNE

SecureDNE

SecureDNE are a leading provider of cutting-edge Fractional CISO, Managed Cybersecurity Services, and Cybersecurity Engineering Solutions.

Fescaro

Fescaro

FESCARO is a trusted cybersecurity partner for global automakers and their partners, helping them transition to software-defined vehicles (SDVs) with tailored automotive software solutions.

Career Smarter

Career Smarter

Career Smarter offers accredited online courses in cybersecurity and other sectors, helping learners gain industry-recognised certifications.